The presentation discusses the importance of threat modeling and supply chain security in DevOps and provides best practices for securing the supply chain.
- Threat modeling is important to bring quantifiability and reason to abstract threats and to identify attack paths.
- The Stride process and standards documents can be used to exhaust potential permutations of threats and identify simple controls to cover as many cases as possible.
- The attack tree is a visual representation of an attack and can be used to multiply likelihood and impact to give abstract risk scores.
- Layering controls across the branches of the attack tree can break the attack chain and provide a minimum viable set of security configurations.
- Pipeline metadata is important for piecing things back together and giving a different type of observation.
- Best practices for securing the supply chain include using S-bombs, artifact signing, and evidence leaks and ledgers.
- Measuring SAL level and mean time to remediation are useful indicators of vendor maturity.
- Retrofitting and slowly maturing the supply chain is important.
- Asking vendors for S-bombs is a closer first step than asking for SAL level.